Csec 630 Team Assignment Tracking

On By In 1

By Morton L. Mandel and John A. Bryne5 minute Read

I’ve always approached business the way a classical musician reads a sheet of music. What counts is how well and how passionately you execute the notes as written, not how you improvise them. Whether you play the violin in a symphony or lead a for-profit or nonprofit organization, great execution requires discipline and focus. You cannot achieve flawless execution without a painstaking devotion to the details. It is not easy to keep track of all the things necessary to achieve such flawless execution.

That’s why every manager I work with has a factbook. It’s a three-ring binder that breaks down a manager’s tasks into small, manageable steps. Such a factbook keeps you on top of the details and assures that there are no misunderstandings between managers and their subordinates.

At its simplest level, the factbook is a tool that keeps you focused and disciplined about your work. It contains the minutes of meetings with your boss, all assignments, your progress against these assignments, and a 12-month schedule of future meetings. If it’s put together carefully, the factbook is the place to go where your work life is both organized and crystal clear.

So when I work with a colleague in regular planning sessions, typically once a month, my three-ring binder has the same tabs as he has in his. The tabs quickly get you to the minutes of the last meeting, a person’s prioritized assignments, and an update on what he’s accomplished since our last session. Each task stays on that assignment list until complete. Nothing is forgotten. That makes it easy to focus on the important things and never lose your place. Every assignment is there in black and white, staring at the person who is responsible for getting it done. He can’t forget about it. Just as important, the boss can’t forget about it, either. Too often, that’s exactly what happens.

All of us can get overwhelmed with things to do at work and in our lives. We’re often racing from one meeting to the next, from one city or country to another. Every business is a fairly complicated system. If you’re leading an organization and seeking flawless execution in the pursuit of excellence, the best way to stay on top of all the details is to have a clear accounting of them. The system reminds you of what’s important. It also imposes accountability on the boss and the subordinate to get things done.

A factbook can take away excuses. Using this process, it’s unlikely that people will not have enough work to keep them busy. And if a subordinate feels unhappy about something, the regular sit-down meetings with her boss gives her an opportunity to address these feelings. Mostly, the factbook can be the place where the details of your work are made the focus of how you do your work.

To an outsider, a factbook looks deceivingly simple. To me, the three-ring binder that every key employee has is not merely a notebook. It is a process. Every month, almost every key manager in our company has a factbook meeting with his or her boss. Typically, it’s a one-to-two-hour opportunity to have a thoughtful and candid conversation. Together, the manager and her boss review the progress the manager’s made against her written assignments, and her boss can help reprioritize them, given the always changing needs of the business.

These sessions always start with the subordinate reading aloud the minutes of the previous meeting. This gives the meeting structure and organization. It’s a natural follow-through from the last meeting. This reminds both parties of what was discussed at the last meeting, and provides a way to share what has been accomplished since then.

This is detail, and it works! The minutes become an agenda. Reading the minutes almost always triggers considerable discussion and, often, major modification. Sometimes it leads to the reversal of a decision. Other times, it can lead to a deep discussion of execution issues.

After the meeting, the employee is responsible for creating a set of minutes. These minutes are sent back to the supervisor as soon as possible. They are sometimes corrected by the boss as needed, and then placed into both three-ring binders for the next session.

The factbook system is a great way to stay on track and make real decisions, with built-in accountability. When a meeting is over, there is great clarity. Both parties know what to do. The face-to- face interaction also allows subordinates to push back when there is too much on their plate or if a project proves to be much harder than initially anticipated.

The benefits are clear:
1.The system can make you a better professional. A factbook helps you stay organized and disciplined. It enables you to always be working on the right things, as agreed every month with your boss.

2.The system ensures that the most important work gets done first, by putting a laser-like focus on an individual’s work plan and carefully setting priorities.

3.The system makes you feel more engaged. You can’t go through this process and not understand just what is expected of you. It reinforces our culture as well, reminding us that we must stay focused on what we do if we want to achieve superior execution.

One of the most difficult tasks any leader has is to get the full story from his subordinates. It’s only natural for people to try to please the boss. So as a leader you’re less likely to get the full truth unless you have a way to find it. These structured meetings help you discover what’s getting done and what isn’t. The planning my managers do with their subordinates will reflect the planning I do with them. Because I get the minutes of factbook meetings between my subordinates and their direct reports, I can see in detail what people are doing a layer down and how our goals and objectives cascade through the organization. This gives me a deeper understanding of what is actually happening on the ground.

Factbooks create a way for people to deeply understand the policies and strategies that make for excellence in execution. Fact-books are the sheet music a leader needs to expertly play a symphony.

Excerpted with permission from the publisher, Wiley, from It’s All About Who You Hire, How They Lead…and Other Essential Advice from a Self-Made Leader, by Mort Mandel and John Byrne. Copyright 2012.

–Morton L. Mandel is a self-made billionaire, entrepreneur, and philanthropist. With his brothers, Jack and Joseph, he cofounded Premier Industrial Corporation in 1940, eventually merging it with Farnell Electronics in a $3 billion deal. The three Mandel brothers also established the Jack, Joseph and Morton Mandel Foundation, which funds numerous social leadership initiatives all over the world.

John A. Bryne is former executive editor of BusinessWeek, former editor in chief of Fast Company, and author of 10 books, including the New York Times best seller Jack: Straight from the Gut with Jack Welch.

[Image: Flickr user Duesentrieb]

CSEC Course Listing

Cyberspace and Cybersecurity (CSEC 610, 6 Credits)
(Must be taken as the first course in the program.) A study of the fundamentals of cyberspace and cybersecurity. Topics include cyber architecture, cyber services, protocols, algorithms, hardware components, software components, programming languages, various cybersecurity mechanisms, business continuity planning, security management practices, security architecture, operations security, physical security, cyber terrorism, and national security.

Human Aspects in Cybersecurity: Ethics, Legal Issues, and Psychology (CSEC 620, 6 Credits)
Prerequisite: CSEC 610. An examination of the human aspects in cybersecurity. Topics include ethics, relevant laws, regulations, policies, standards, psychology, and hacker culture. Emphasis is on the human element and the motivations for cyber crimes. Analysis covers techniques to prevent intrusions and attacks that threaten organizational data.

Prevention and Protection Strategies in Cybersecurity (CSEC 630, 6 Credits)
Prerequisite: CSEC 610. An in-depth study of the theories and practices for prevention of cyber-attacks. Countermeasures discussed include training, encryption, virtual private networks, policies, practices, access controls, secure systems development, software assurance arguments, verification and validation; firewall architectures, anti-virus, patching practices, personnel security practices, and physical security practices. Business continuity plans and disaster recovery plans (BCP, DRP) are also discussed. Strategies for large-scale prevention are also discussed, such as critical infrastructure protection, international collaboration and law enforcement.

National Cybersecurity Policy and Law (CSEC 635, 6 Credits)
An exploration of the role of government in securing cyberspace. Topics include federal, state, and local entities involved in cybersecurity; relevant laws and regulation; concepts of civil liberties, intellectual property, and privacy; policy formulation and analysis; law enforcement; development and diffusion of standards; and national security. Discussion also covers public/private engagement models and opportunities and tools for government to encourage cybersecurity education, awareness, and research.

Monitoring, Auditing, Intrusion Detection, Intrusion Prevention, and Penetration Testing (CSEC 640, 6 Credits)
Prerequisite: CSEC 610. An in-depth study of the theory and practice of intrusion detection and prevention in cyberspace. Topics include network security, monitoring, auditing, intrusion detection, intrusion prevention, and ethical penetration testing. Emphasis is on methods to identify system vulnerabilities and threats and prevent attacks.

Enterprise and Cloud Cybersecurity Policy (CSEC 645, 6 Credits)
Prerequisite: CSEC 635. An exploration of organizational policies to respond to cybersecurity threats. Topics include strategic cybersecurity initiatives, cybersecurity in interorganizational relationships, increasing cybersecurity awareness in the organization, compliance issues, liability, and promoting a culture of sensitivity to cybersecurity issues.

Cyber Crime Investigation and Digital Forensics (CSEC 650, 6 Credits)
Prerequisite: CSEC 610. An in-depth study of the theory and practice of digital forensics. Topics include computer forensics, network forensics, cell phone forensics, and other types of digital forensics. Discussion also covers identification, collection, acquisition, authentication, preservation, examination, analysis, and presentation of evidence for prosecution purposes

Global Cybersecurity (CSEC 655, 6 Credits)
Prerequisite: CSEC 645. An in-depth study of cybersecurity from a global perspective. Topics include cyberterrorism, cybercrime, and cyberwarfare; the international legal environment; nation- and region-specific norms regarding privacy and intellectual property; international standard setting; effects on trade (including offshore outsourcing); and opportunities for international cooperation.

Digital Forensic Investigations (CSEC 661, 6 Credits)
Prerequisite: CSEC 610. A study of the processes and technologies used in the collection, preservation, and analysis of digital evidence in local, networked, and cloud environments. Discussion covers validating data, reporting evidence, and preparing depositions, as well as recovering information from encrypted, obscured, or deleted sources. Topics also include emerging forensic issues in computer, peripheral, and mobile environments and their global implications.

Cyber Incident Analysis and Response (CSEC 662, 6 Credits)
Prerequisite: CSEC 610. An examination of policies and procedures related to security incidents, exposures, and risks and technologies used to respond to such threats. Topics include dynamic vulnerability analysis, intrusion detection, attack response, evidence protection, and business continuity. Discussion also covers types and modes of computer-facilitated attacks, readiness, and evidence scope, as well as the role of computer emergency response teams.

Cybersecurity Capstone (CSEC 670, 6 Credits)
Prerequisite: Completion of all other program courses. A study of and an exercise in developing, leading, and implementing effective enterprise- and national-level cybersecurity programs. Focus is on establishing programs that combine technological, policy, training, auditing, personnel, and physical elements. Challenges within specific industries (such as health, banking, finance, and manufacturing) are discussed. Topics include enterprise architecture, risk management, vulnerability assessment, threat analysis, crisis management, security architecture, security models, security policy development and implementation, security compliance, information privacy, identity management, incident response, disaster recovery, and business continuity planning. A project reflecting integration and application of learning of cybersecurity is included.

0 comments

Leave a Reply

Your email address will not be published. Required fields are marked *